Printer Friendly

Six steps to policy excellence: Dominic Saunders Senior vice president at Cryptzone gives an IT security experts view on best practice policy management.

Striking the right balance between risk mitigation and the commercial demands of the business is an essential skill, which must be adapted according to according to
prep.
1. As stated or indicated by; on the authority of: according to historians.

2. In keeping with: according to instructions.

3.
 the nature of your industry and the size, culture and risk appetite of your organisation. This role needs to have clear ownership at senior management level.

Organisations need to take a systematic and proactive approach to risk mitigation if they are to be better prepared to satisfy evolving legal and regulatory requirements, manage the costs of compliance and realise competitive advantage.

Achieving and maintaining policy compliance becomes more difficult to sustain as organisations grow, become more geographically dispersed and more highly regulated. But, it doesn't have to be this way.

The purpose of policies and procedures Policies and Procedures are a set of documents that describe an organization's policies for operation and the procedures necessary to fulfill the policies. They are often initiated because of some external requirement, such as environmental compliance or other governmental  

Policies and procedures establish guidelines to behaviour and business processes in accordance with an organisation's strategic objectives. Whilst typically developed in response to legal and regulatory requirements, their primary purpose should be to convey accumulated wisdom on how best to get things done in a risk-free, efficient and compliant way.

Policy Pitfalls

Here are some of the most common grounds This article or section needs sources or references that appear in reliable, third-party publications. Alone, primary sources and sources affiliated with the subject of this article are not sufficient for an accurate encyclopedia article.  for policy non-compliance:

* poorly worded policies

* badly structured policies

* out-of-date policies

* inadequately communicated policies

* un-enforced policies

* lack of management scrutiny

So, what is the secret for effective policy management?

Policy Excellence In Six Steps

Step One: Create/Review

It is important to understand, when creating policies, that those created purely to satisfy auditors and regulatory bodies are unlikely to improve business performance or bring about policy compliance, as they rarely change employee behaviour appropriately. While satisfying legal departments, and looking impressive to auditors and regulators, busy employees will instantly be turned off by lengthy policy documents full of technical and legal jargon. External factors that affect policies are evolving all the time: for example technology advances may lead to information security policies and procedures becoming obsolete. Additionally, changes in the law or industry regulations require operational policies to be frequently adjusted. Some policies, such as Payment Card Industry DSS (1) (Digital Signature Standard) A National Security Administration standard for authenticating an electronic message. See RSA and digital signature.

(2) (Digital Satellite S
 compliance, have to be re-presented and signed up to on an annual basis.

Typically, most "policy" documents are lengthy, onerous on·er·ous  
adj.
1. Troublesome or oppressive; burdensome. See Synonyms at burdensome.

2. Law Entailing obligations that exceed advantages.
 and largely unreadable--many are written using complex jargon, and most contain extraneous ex·tra·ne·ous  
adj.
1. Not constituting a vital element or part.

2. Inessential or unrelated to the topic or matter at hand; irrelevant. See Synonyms at irrelevant.

3.
 content which would be better classed as procedures, standards, guidelines and forms. Such documents should be associated with the policy. Documents must be written using language that is appropriate for the target audience and should spell out the consequences of non-compliance. Smaller, more manageable documents are easier for an organisation to review and update, whilst also being more palatable pal·at·a·ble  
adj.
1. Acceptable to the taste; sufficiently agreeable in flavor to be eaten.

2. Acceptable or agreeable to the mind or sensibilities: a palatable solution to the problem.
 for the intended recipients. Inadequate version control and high production costs can be reduced by automating the entire process using an electronic system.

Step Two: Distribute

A key step in the policy management lifecycle is to ensure that staff are aware of relevant policies and procedures. Organisations need to effectively distribute policies, both new and updated, in a timely and efficient manner. These need to be consistently enforced across an organisation. After all, what is the point of expending considerable effort and cost to write and approve policies, if they are not effectively distributed and read?

Step Three: Achieve Consent

In many cases, regulatory requirements call for evidence of policy acceptance, demanding a more pro-active and thorough approach to the policy management lifecycle. A process needs to be implemented that monitors users' response to policies. Policy distribution should be prioritised, ensuring that higher risk policies are signed off earlier by users than other lower risk documents. For example, an organisation may want to ensure that a user signs up to their Information Governance policy on the first day that they start employment, whilst having up to two weeks to sign up to the Travel & Expense Policy. Systems need to in place to grant a user two weeks to process a particular document, after which the system should automatically force the user to process it.

Step Four: Understanding

To monitor and measure staff comprehension and effectiveness of policies and associated documentation, organisations should test all, or perhaps a subset of, users. Any areas that show weaknesses can be identified and corrected accordingly. Additional training or guidance may be necessary or, if it's the policy that is causing confusion, it can be reworded or simplified.

Step Five: Auditability

In many cases regulatory requirements call for evidence of policy acceptance, which demands a more pro-active and thorough approach to the policy management lifecycle. The full revision history of all documents needs to be maintained as well as who has read what, when and, if possible, how long it took; who declined a policy and why. This record should be stored for future reference and may be stored in conjunction with test results.

Step Six: Reporting

To affect change and improve compliance it helps if key performance indicators Key Performance Indicators (KPI) are financial and non-financial metrics used to quantify objectives to reflect strategic performance of an organization. KPIs are used in Business Intelligence to assess the present state of the business and to prescribe a course of action.  relating to relating to relate prepconcernant

relating to relate prepbezüglich +gen, mit Bezug auf +acc 
 policy uptake are clearly visible across all levels of an enterprise. Dashboard visibility of policy uptake compliance by geographical or functional business units helps to consolidate information and highlights exceptions.

Being able to quickly drill down for specific details in areas of poor policy compliance dramatically improves management's ability to understand and address underlying issues.

Bringing it all together

To check the level of policy compliance that exists within your organisation you need to periodically answer the following questions:

* where are you current policies? - Are the accessible to staff?

* who has seen your current policies?

* who has read your current policies?

* do your staff understand them?

* are your policies being followed by everyone?

* are your policies effectively managed?

* are your policies up to date?

* and can you prove this to the Auditors?

For those organisations that are serious about staff reading, understanding and signing up to policies, they should consider adopting automated policy management software. This raises standards of policy compliance and provides managers with practical tools to improve policy uptake and adherence.

Ultimately, policy compliance is about getting people to do the right thing, in the right way, every time. Ensuring everyone understands what is expected of them and how they are required to carry out their jobs according to corporate policies and procedures is not a new practice. Embedding 1. (mathematics) embedding - One instance of some mathematical object contained with in another instance, e.g. a group which is a subgroup.
2. (theory) embedding - (domain theory) A complete partial order F in [X -> Y] is an embedding if
 an automated policy management solution into an organisation is really the only viable way to create and sustain a culture of compliance, where people understand their responsibilities and the importance of adhering to corporate standards.

Doing so empowers people to do their jobs within an acceptable governance framework rather than constrained con·strain  
tr.v. con·strained, con·strain·ing, con·strains
1. To compel by physical, moral, or circumstantial force; oblige: felt constrained to object. See Synonyms at force.

2.
 by a rigid set of unenforceable Adj. 1. unenforceable - not enforceable; not capable of being brought about by compulsion; "an unenforceable law"; "unenforceable reforms"
enforceable - capable of being enforced
 rules. By effectively handling the policy management lifecycle you can create a firm foundation for effective risk mitigation and governance. Automation helps the benefits of policy compliance for The Board, line managers and the general workforce get to grips with policy compliance and puts forward a cost-efficient approach for achieving policy excellence. www.cryptzone.com
COPYRIGHT 2011 A.P. Publications Ltd.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2011 Gale, Cengage Learning. All rights reserved.

 Reader Opinion

Title:

Comment:



 

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:SECURITY SUPPLEMENT
Author:Saunders, Dominic Sr.
Publication:Database and Network Journal
Geographic Code:4EUUK
Date:Dec 1, 2011
Words:1129
Previous Article:Five questions to answer before purchasing full-disk encryption software: Garry McCracken, Vice President Technology Partnerships at WinMagic Inc.
Next Article:Mobile voice OTT could become a disruptive force.
Topics:

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters